[go: up one dir, main page]

TW201415278A - System and method for monitoring application - Google Patents

System and method for monitoring application Download PDF

Info

Publication number
TW201415278A
TW201415278A TW101136022A TW101136022A TW201415278A TW 201415278 A TW201415278 A TW 201415278A TW 101136022 A TW101136022 A TW 101136022A TW 101136022 A TW101136022 A TW 101136022A TW 201415278 A TW201415278 A TW 201415278A
Authority
TW
Taiwan
Prior art keywords
application
electronic device
usage rights
protection action
risk factor
Prior art date
Application number
TW101136022A
Other languages
Chinese (zh)
Inventor
si-quan Chen
Huo Wu
jun-nan Fan
Original Assignee
Hon Hai Prec Ind Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hon Hai Prec Ind Co Ltd filed Critical Hon Hai Prec Ind Co Ltd
Publication of TW201415278A publication Critical patent/TW201415278A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The present disclosure provides a system and a method for monitoring applications. The method is applied in an electronic device. The method includes: when an application is opened, obtaining all the use permissions supported the run of the application from the operating system of the electronic device; determining whether there is one or more dangerous use permissions among all the obtained use permission according to a recording table; and execute a protection action if one or more dangerous use permissions exists.

Description

應用程式監控系統及應用程式監控方法Application monitoring system and application monitoring method

本發明涉及一種應用程式監控系統及方法,特別涉及一種監控應用程式是否為危險應用程式的監控系統及方法。The present invention relates to an application monitoring system and method, and more particularly to a monitoring system and method for monitoring whether an application is a dangerous application.

用戶可通過網路或其他方式下載各種應用程式至智慧手機、電腦等。下載的某些應用程式有可能為危險應用程式,在用戶使用這些應用程式的時候,有可能會導致重要資訊的洩露等。例如,某個遊戲程式需要開啟網路使用權限才能正常運行時,則該遊戲程式有可能為危險應用程式,運行該遊戲程式有可能會導致個人資訊的洩露。而危險應用程式啟動可能會導致重要資訊的洩露的使用權限通常是在後臺運行,用戶並不知曉。Users can download various applications to smart phones, computers, etc. via the Internet or other means. Some of the downloaded applications may be dangerous applications. When users use these applications, they may lead to the disclosure of important information. For example, if a game program needs to enable network access to run normally, the game program may be a dangerous application. Running the game program may lead to the disclosure of personal information. The use of a dangerous application to launch may result in the disclosure of important information is usually run in the background, the user does not know.

有鑒於此,有必要提供一種應用程式監控系統及應用程式監控方法。In view of this, it is necessary to provide an application monitoring system and an application monitoring method.

所述應用程式監控系統應用於一電子裝置,所述電子裝置上安裝有多個應用程式,所述電子裝置的作業系統記錄每一應用程式安裝時向所述作業系統申請的需要所述電子裝置開通的所有使用權限,所述電子裝置存儲有一記錄表,記錄每一應用程式運行時需要所述電子裝置開通的所有合法的使用權限,所述應用程式監控系統包括:一獲取模組,在一應用程式開啟時,從所述電子裝置的作業系統中獲取所述當前開啟的應用程式運行時需要所述電子裝置開通的所有使用權限;一判斷模組,根據所述記錄表判斷所述獲取模組獲取的所有使用權限中是否存在一個或多個非法的使用權限;以及一執行模組,在所述獲取的所有使用權限中存在一個或多個非法的使用權限時,執行保護動作。The application monitoring system is applied to an electronic device, and the electronic device is installed with a plurality of applications, and the operating system of the electronic device records the need for the electronic device to be applied to the operating system when each application is installed. All the usage rights of the opening, the electronic device stores a record table, and records all legal usage rights required for the electronic device to be opened when each application runs. The application monitoring system includes: an acquisition module, in an When the application is started, obtaining, from the operating system of the electronic device, all the usage rights that the electronic device is required to be opened when the currently open application is running; and a determining module determining the acquisition mode according to the recording table Whether one or more illegal usage rights exist in all the usage rights acquired by the group; and an execution module performs a protection action when one or more illegal usage rights exist in all the acquired usage rights.

所述應用程式監控方法應用於一電子裝置,所述電子裝置上安裝有多個應用程式,所述電子裝置的作業系統記錄每一應用程式安裝時向所述作業系統申請的需要所述電子裝置開通的所有使用權限,所述電子裝置存儲有一記錄表,記錄每一應用程式運行時需要所述電子裝置開通的所有合法的使用權限,所述方法包括:在一應用程式開啟時,從所述電子裝置的作業系統中獲取所述當前開啟的應用程式運行時需要所述電子裝置開通的所有使用權限;根據所述記錄表判斷所述獲取的所有使用權限中是否存在一個或多個非法的使用權限;以及在所述獲取的所有使用權限中存在一個或多個非法的使用權限時,執行保護動作。The application monitoring method is applied to an electronic device, and the electronic device is installed with a plurality of applications, and the operating system of the electronic device records the need for the electronic device to be applied to the operating system when each application is installed. All the usage rights of the opening, the electronic device stores a record table, and records all legal usage rights required for the opening of the electronic device when the application is running, and the method includes: when the application is opened, from the Obtaining, in the operating system of the electronic device, all the usage rights that are required to be opened by the electronic device when the currently open application is running; determining, according to the record table, whether one or more illegal uses exist in the acquired usage rights. Permission; and when one or more illegal usage rights exist in all of the acquired usage rights, the protection action is performed.

本發明中的應用程式監控系統及方法可監控開啟的應用程式是否為危險應用程式,並在開啟的應用程式為危險應用程式時,執行保護動作,防止危險應用程式對用戶造成損失。The application monitoring system and method of the present invention can monitor whether the open application is a dangerous application, and perform a protection action when the open application is a dangerous application, thereby preventing the dangerous application from causing loss to the user.

請參考圖1及圖2,本發明中的應用程式監控系統10應用於一安裝有多個應用程式30的電子裝置100。應用程式監控系統10用於監控電子裝置100中的危險應用程式。電子裝置100的作業系統20記錄每一應用程式30安裝時向作業系統20申請的需要電子裝置100開通的所有使用權限,如網路許可權,攝像頭開啟許可權,藍牙許可權等。電子裝置100還存儲有一記錄表40,記錄每一應用程式30運行時需要電子裝置100開通的所有的合法的使用權限。在本實施方式中,使用者可從提供正規的應用程式的提供商處知曉該正規的應用程式運行時需要電子裝置100開通的使用權限,並將該些使用權限寫入電子裝置100中,該些使用權限則為該正規的應用程式運行時需要電子裝置100開通的合法的使用權限。使用者從網站上或通過其他途徑下載至電子裝置100的應用程式中有可能存在危險應用程式,危險應用程式運行時除了需要電子裝置100開通相應的正規的應用程式運行時需要的合法的使用權限外,還需要電子裝置100開通其他的使用權限,而開通其他的使用權限則有可能造成重要資訊洩露等。例如,一正規的A遊戲軟體運行時需要電子裝置100開通感應器許可權。而使用者從某網站上下載的A遊戲軟體運行時除了需要電子裝置100開通感應器許可權外,還需要電子裝置100開通網路許可權,則從網站上下載的A遊戲軟體為危險應用程式。在本實施方式中,電子裝置100為具有Android系統的智慧手機。Referring to FIG. 1 and FIG. 2, the application monitoring system 10 of the present invention is applied to an electronic device 100 in which a plurality of applications 30 are installed. The application monitoring system 10 is for monitoring dangerous applications in the electronic device 100. The operating system 20 of the electronic device 100 records all usage rights, such as network permission, camera open permission, Bluetooth permission, etc., that are required to be opened to the operating system 20 when the application 30 is installed. The electronic device 100 also stores a record table 40 that records all legal usage rights that the electronic device 100 needs to be activated when each application 30 runs. In this embodiment, the user can know from the provider that provides the regular application that the normal application needs to be opened by the electronic device 100 during operation, and write the usage rights into the electronic device 100. These usage rights are legal usage rights required for the electronic device 100 to be activated when the regular application is running. There may be a dangerous application in the application downloaded from the website or through other means to the electronic device 100. In addition to the legitimate usage permission required when the dangerous application is running, the electronic device 100 needs to open the corresponding formal application. In addition, the electronic device 100 is required to open other usage rights, and the opening of other usage rights may cause important information leakage. For example, a regular A game software runtime requires the electronic device 100 to turn on sensor permissions. When the user downloads the A game software from a website, in addition to requiring the electronic device 100 to open the sensor permission, the electronic device 100 is required to open the network permission, and the A game software downloaded from the website is a dangerous application. . In the present embodiment, the electronic device 100 is a smart phone having an Android system.

應用程式監控系統10包括一獲取模組12、一判斷模組14及一執行模組16。以下結合圖3的方法流程圖說明各模組的具體功能。The application monitoring system 10 includes an acquisition module 12, a determination module 14, and an execution module 16. The specific functions of each module will be described below in conjunction with the method flowchart of FIG.

步驟S301中,獲取模組12在一應用程式30開啟時,從電子裝置100的作業系統20中獲取當前開啟的應用程式30運行時需要電子裝置100開通的所有使用權限。In step S301, the acquisition module 12 acquires, from the operating system 20 of the electronic device 100, all the usage rights required for the electronic device 100 to be activated when the currently open application 30 is running.

步驟S302中,判斷模組14根據電子裝置100中的記錄表40判斷獲取模組12獲取的所有使用權限中是否存在一個或多個非法的使用權限。在存在非法的使用權限時,執行步驟S303,否則執行步驟S304。In step S302, the determination module 14 determines, according to the record table 40 in the electronic device 100, whether one or more illegal usage rights exist in all the usage rights acquired by the acquisition module 12. When there is an illegal use right, step S303 is performed, otherwise step S304 is performed.

步驟S303中,執行模組16執行保護動作。執行模組16可輸出一提示資訊,提示用戶當前開啟的應用程式30為一危險應用程式,或者直接遮罩當前開啟的應用程式30,使用戶不能操作該應用程式30。進一步,執行模組16還根據預設的規則計算電子裝置100開通所述一個或多個非法的使用權限的危險係數,並根據計算出來的危險係數執行與當前開啟的應用程式30相關的動作。在一種實施方式中,預設的規則為每增加一個非法的使用權限,危險係數增加10%。在其他實施方式中,不同的使用權限對應不同的危險係數,如攝像頭使用權限對應的危險係數為10%,網路使用權限對應的危險係數為30%。在本實施方式中,執行模組16在計算出來的危險係數小於一預設值時,輸出一提示資訊以提示用戶當前開啟的應用程式30為一危險的應用程式,以及在計算出來的危險係數等於或大於該預設值時,直接遮罩當前開啟的應用程式30。In step S303, the execution module 16 performs a protection action. The execution module 16 can output a prompt message, prompting the user that the currently open application 30 is a dangerous application, or directly masking the currently open application 30, so that the user cannot operate the application 30. Further, the execution module 16 further calculates, according to a preset rule, the risk factor of the one or more illegal usage rights of the electronic device 100, and performs an action related to the currently open application 30 according to the calculated risk factor. In one embodiment, the preset rule is that the risk factor is increased by 10% for each additional illegal usage right. In other embodiments, different usage rights correspond to different risk factors, such as a risk factor corresponding to 10% of the camera usage rights and a risk factor corresponding to 30% of the network usage rights. In this embodiment, when the calculated risk factor is less than a preset value, the execution module 16 outputs a prompt message to prompt the user that the currently opened application 30 is a dangerous application, and the calculated risk factor. When it is equal to or greater than the preset value, the currently open application 30 is directly masked.

步驟S304中,執行模組16通知作業系統20正常運行當前開啟的應用程式30。In step S304, the execution module 16 notifies the operating system 20 to normally run the currently open application 30.

100...電子裝置100. . . Electronic device

20...作業系統20. . . working system

30...應用程式30. . . application

40...記錄表40. . . recording sheet

10...應用程式監控系統10. . . Application monitoring system

12...獲取模組12. . . Get module

14...判斷模組14. . . Judging module

16...執行模組16. . . Execution module

S301...獲取當前開啟的應用程式運行時需要電子裝置開通的所有使用權限S301. . . Get all access rights for the currently open application to be opened by the electronic device

S302...是否存在非法的使用權限S302. . . Is there illegal use permission?

S303...執行保護動作S303. . . Perform protection action

S304...通知電子裝置正常運行當前開啟的應用程式S304. . . Inform the electronic device to run the currently open application

圖1為本發明一種實施方式中應用程式監控系統的功能模組圖。FIG. 1 is a functional block diagram of an application monitoring system according to an embodiment of the present invention.

圖2為本發明一種實施方式中執行圖1中的應用程式監控系統的架構圖。2 is a block diagram of an application monitoring system of FIG. 1 in an embodiment of the present invention.

圖3為本發明一種實施方式中應用程式監控方法的流程圖。3 is a flow chart of an application monitoring method in an embodiment of the present invention.

S301...獲取當前開啟的應用程式運行時需要電子裝置開通的所有使用權限S301. . . Get all access rights for the currently open application to be opened by the electronic device

S302...是否存在非法的使用權限S302. . . Is there illegal use permission?

S303...執行保護動作S303. . . Perform protection action

S304...通知電子裝置正常運行當前開啟的應用程式S304. . . Inform the electronic device to run the currently open application

Claims (12)

一種應用程式監控系統,應用於一電子裝置,所述電子裝置上安裝有多個應用程式,所述電子裝置的作業系統記錄每一應用程式安裝時向所述作業系統申請的需要所述電子裝置開通的所有使用權限,所述電子裝置存儲有一記錄表,記錄每一應用程式運行時需要所述電子裝置開通的所有合法的使用權限,其改良在於,所述應用程式監控系統包括:
一獲取模組,在一應用程式開啟時,從所述電子裝置的作業系統中獲取所述當前開啟的應用程式運行時需要所述電子裝置開通的所有使用權限;
一判斷模組,根據所述記錄表判斷所述獲取模組獲取的所有使用權限中是否存在一個或多個非法的使用權限;以及
一執行模組,在所述獲取的所有使用權限中存在一個或多個非法的使用權限時,執行保護動作。
An application monitoring system is applied to an electronic device, wherein the electronic device is installed with a plurality of applications, and the operating system of the electronic device records the need for the electronic device to be applied to the operating system when each application is installed. All the usage rights of the opening, the electronic device stores a record table, and records all legal use rights that the electronic device needs to be opened when each application runs. The improvement is that the application monitoring system includes:
An obtaining module, when an application is opened, obtaining, from the operating system of the electronic device, all usage rights required for the currently open application to be opened by the electronic device;
a determining module, determining, according to the record table, whether one or more illegal usage rights exist in all the usage rights acquired by the obtaining module; and an execution module, wherein one of the acquired usage rights exists A protection action is performed when multiple illegal usage rights are used.
如申請專利範圍第1項所述的應用程式監控系統,其中,所述執行模組執行保護動作具體為:所述執行模組輸出一提示資訊以提示用戶所述當前開啟的應用程式為一危險的應用程式。The application monitoring system of claim 1, wherein the execution module performs a protection action, wherein the execution module outputs a prompt message to prompt the user that the currently open application is a danger. Application. 如申請專利範圍第1項所述的應用程式監控系統,其中,所述執行模組執行保護動作具體為:所述執行模組遮罩所述當前開啟的應用程式。The application monitoring system of claim 1, wherein the execution module performs a protection action specifically: the execution module masks the currently open application. 如申請專利範圍第1項所述的應用程式監控系統,其中,所述執行模組進一步根據預設的規則計算所述電子裝置開通所述一個或多個非法的使用權限的危險係數,以及根據所述危險係數執行保護動作。The application monitoring system of claim 1, wherein the execution module further calculates, according to a preset rule, a risk factor for the electronic device to open the one or more illegal usage rights, and according to The risk factor performs a protection action. 如申請專利範圍第4項所述的應用程式監控系統,其中,所述執行模組根據所述危險係數執行保護動作具體為:所述執行模組在計算出來的危險係數小於一預設值時,輸出一提示資訊以提示用戶所述當前開啟的應用程式為一危險的應用程式。The application monitoring system of claim 4, wherein the execution module performs a protection action according to the risk factor, wherein the execution module is when the calculated risk factor is less than a preset value. A prompt message is output to prompt the user that the currently open application is a dangerous application. 如申請專利範圍第5項所述的應用程式監控系統,其中,所述執行模組根據所述危險係數執行保護動作具體為:所述執行模組在計算出來的危險係數等於或大於該預設值時,遮罩所述當前開啟的應用程式。The application monitoring system of claim 5, wherein the execution module performs a protection action according to the risk factor, wherein the calculated module has a calculated risk factor equal to or greater than the preset. When the value is, the currently open application is masked. 一種應用程式監控方法,應用於一電子裝置,所述電子裝置上安裝有多個應用程式,所述電子裝置的作業系統記錄每一應用程式安裝時向所述作業系統申請的需要所述電子裝置開通的所有使用權限,所述電子裝置存儲有一記錄表,記錄每一應用程式運行時需要所述電子裝置開通的所有合法的使用權限,其改良在於,所述方法包括:
在一應用程式開啟時,從所述電子裝置的作業系統中獲取所述當前開啟的應用程式運行時需要所述電子裝置開通的所有使用權限;
根據所述記錄表判斷所述獲取的所有使用權限中是否存在一個或多個非法的使用權限;以及
在所述獲取的所有使用權限中存在一個或多個非法的使用權限時,執行保護動作。
An application monitoring method is applied to an electronic device, wherein the electronic device is installed with a plurality of application programs, and the operating system of the electronic device records the need for the electronic device to be applied to the operating system when each application is installed. All the usage rights of the opening, the electronic device stores a record table, and records all legal usage rights that the electronic device needs to be opened when each application runs. The improvement is that the method includes:
When an application is started, obtaining, from the operating system of the electronic device, all the usage rights that the currently opened application needs to be opened when the currently open application is running;
Determining, according to the record table, whether one or more illegal usage rights exist in all the acquired usage rights; and performing one or more illegal usage rights among the acquired usage rights, performing a protection action.
如申請專利範圍第7項所述的應用程式監控方法,其中,所述執行保護動作具體為:輸出一提示資訊以提示用戶所述當前開啟的應用程式為一危險的應用程式。The application monitoring method of claim 7, wherein the performing the protection action is specifically: outputting a prompt information to prompt the user that the currently open application is a dangerous application. 如申請專利範圍第7項所述的應用程式監控方法,其中,所述執行保護動作具體為:遮罩所述當前開啟的應用程式。The application monitoring method of claim 7, wherein the performing the protection action is specifically: masking the currently open application. 如申請專利範圍第7項所述的應用程式監控方法,其中,所述方法還包括:根據預設的規則計算所述電子裝置開通所述獲取的一個或多個非法的使用權限的危險係數,以及根據所述危險係數執行保護動作。The application monitoring method of claim 7, wherein the method further comprises: calculating, according to a preset rule, the risk factor of the one or more illegal usage rights acquired by the electronic device, And performing a protection action according to the risk factor. 如申請專利範圍第10項所述的應用程式監控方法,其中,根據所述危險係數執行保護動作具體為:在計算出來的危險係數小於一預設值時,顯示一提示資訊以提示用戶所述當前開啟的應用程式為一危險的應用程式。The application monitoring method according to claim 10, wherein the performing the protection action according to the risk factor is specifically: displaying a prompt information to prompt the user when the calculated risk coefficient is less than a preset value The currently open application is a dangerous application. 如申請專利範圍第11項所述的應用程式監控方法,其特徵在於,根據所述危險係數執行保護動作具體為:在計算出來的危險係數等於或大於該預設值時,遮罩所述當前開啟的應用程式。The application monitoring method according to claim 11, wherein the performing the protection action according to the risk factor is specifically: masking the current current when the calculated risk coefficient is equal to or greater than the preset value Opened application.
TW101136022A 2012-09-18 2012-09-28 System and method for monitoring application TW201415278A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210345518XA CN102915417A (en) 2012-09-18 2012-09-18 Application monitoring system and application monitoring method

Publications (1)

Publication Number Publication Date
TW201415278A true TW201415278A (en) 2014-04-16

Family

ID=47613780

Family Applications (1)

Application Number Title Priority Date Filing Date
TW101136022A TW201415278A (en) 2012-09-18 2012-09-28 System and method for monitoring application

Country Status (3)

Country Link
US (1) US20140082727A1 (en)
CN (1) CN102915417A (en)
TW (1) TW201415278A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI651624B (en) * 2017-01-25 2019-02-21 楊建綱 Smart hardware safety carrier
US10425821B2 (en) 2017-01-25 2019-09-24 Chien-Kang Yang Mobile data storage device with access control functionality

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9538384B2 (en) * 2013-08-30 2017-01-03 Cellco Partnership Method and apparatus for a device management application
CN104660606B (en) * 2015-03-05 2017-10-20 中南大学 A kind of long-distance monitoring method of application security
CN104915599A (en) * 2015-05-30 2015-09-16 广东欧珀移动通信有限公司 Application program monitoring method and terminal
CN106325993A (en) * 2016-08-22 2017-01-11 宇龙计算机通信科技(深圳)有限公司 Freezing method of application program and terminal
CN108683652A (en) * 2018-05-04 2018-10-19 北京奇安信科技有限公司 A kind of method and device of the processing attack of Behavior-based control permission
CN110727941B (en) * 2019-08-23 2023-10-13 深圳市轱辘车联数据技术有限公司 Privacy data protection method and device, terminal equipment and storage medium

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9523922D0 (en) * 1995-11-23 1996-01-24 At & T Global Inf Solution Method of authenticating an application program and a system therefor
US6801940B1 (en) * 2002-01-10 2004-10-05 Networks Associates Technology, Inc. Application performance monitoring expert
US7383584B2 (en) * 2002-03-27 2008-06-03 Advanced Micro Devices, Inc. System and method for controlling device-to-device accesses within a computer system
US7810091B2 (en) * 2002-04-04 2010-10-05 Mcafee, Inc. Mechanism to check the malicious alteration of malware scanner
US7607010B2 (en) * 2003-04-12 2009-10-20 Deep Nines, Inc. System and method for network edge data protection
US7401361B2 (en) * 2004-10-13 2008-07-15 Lenovo (Singapore) Pte. Ltd. System and method for reducing virus scan time
US7930733B1 (en) * 2006-04-10 2011-04-19 At&T Intellectual Property Ii, L.P. Method and system for execution monitor-based trusted computing
US20080030331A1 (en) * 2006-08-04 2008-02-07 Aten International Co., Ltd. Anti-thief electronic device and method thereof
US8199680B2 (en) * 2007-02-09 2012-06-12 Cisco Technology, Inc. Correlating calls after a referral
CN102405636A (en) * 2009-04-30 2012-04-04 日本电气株式会社 Fraudulent call detection device, fraudulent call detection method, and fraudulent call detection program
US8799583B2 (en) * 2010-05-25 2014-08-05 International Business Machines Corporation Atomic execution over accesses to multiple memory locations in a multiprocessor system
CN102446259B (en) * 2010-09-30 2014-12-31 联想(北京)有限公司 Component access control method and electronic equipment
US8868621B2 (en) * 2010-10-21 2014-10-21 Rillip, Inc. Data extraction from HTML documents into tables for user comparison
CN102186167B (en) * 2011-04-11 2016-02-10 中兴通讯股份有限公司 A kind of to applying the method and system monitored
TWI461958B (en) * 2012-06-22 2014-11-21 Wistron Corp Permission management method for applications, electronic device thereof, and computer readable medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI651624B (en) * 2017-01-25 2019-02-21 楊建綱 Smart hardware safety carrier
US10425821B2 (en) 2017-01-25 2019-09-24 Chien-Kang Yang Mobile data storage device with access control functionality

Also Published As

Publication number Publication date
US20140082727A1 (en) 2014-03-20
CN102915417A (en) 2013-02-06

Similar Documents

Publication Publication Date Title
TW201415278A (en) System and method for monitoring application
US11120130B2 (en) Method and apparatus for protecting kernel control-flow integrity using static binary instrumentation
EP3103056B1 (en) Methods and apparatus for protecting operating system data
Agarwal et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing
Mylonas et al. Smartphone security evaluation The malware attack case
Backes et al. Appguard–fine-grained policy enforcement for untrusted android applications
Spensky et al. Sok: Privacy on mobile devices–it’s complicated
Werthmann et al. Psios: bring your own privacy & security to ios devices
CA3023939C (en) Method and apparatus for dynamic executable verification
CN105205413B (en) A data protection method and device
WO2016045328A1 (en) Terminal application control method and apparatus, and storage medium
TW201541278A (en) Method, electronic device, and user interface for on-demand detecting malware
CN106599709A (en) Privacy information leakage prevention method and device as well as terminal
Alepis et al. Hey doc, is this normal?: exploring android permissions in the post marshmallow era
CN111062032A (en) Anomaly detection method and system and computer-readable storage medium
US10713352B2 (en) Method and apparatus for trusted measurement
KR20150087363A (en) Firmware-implemented software licensing
CN102938037B (en) A kind of plug-in unit call method for browser and plugin manager
CN105989294A (en) Detection method and apparatus for Android package
KR101638257B1 (en) Method for protecting source code of application and apparatus for performing the method
Mylonas et al. On the feasibility of malware attacks in smartphone platforms
CN102594815A (en) Method and device for setting user right and executing corresponding operation before login of operating system
Dar et al. Enhancing security of Android & IOS by implementing need-based security (NBS)
Msgna et al. Secure application execution in mobile devices
JP2015517701A (en) Web page information alteration blocking device and method